Russian Government Hackers Penetrated DNC, Stole Opposition Research on Trump

Total Page:16

File Type:pdf, Size:1020Kb

Russian Government Hackers Penetrated DNC, Stole Opposition Research on Trump Russian government hackers penetrated DNC, stole opposition research on Trump Russian government hackers caught in DNC's networks Play Video 1:26 Russian goverment hackers penetrated the Democratic National Committee and had access to the DNC network for about a year, but all were expelled earlier in June. (Jhaan Elker/The Washington Post) • National By Ellen Nakashima Security June 14 Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to the entire database of opposition research on GOP presidential candidate Donald Trump, according to committee officials and security experts who responded to the breach. The intruders so thoroughly compromised the DNC’s system that they also were able to read all email and chat traffic, said DNC officials and the security experts. The intrusion into the DNC was one of several targeting American political organizations. The networks of presidential candidates Hillary Clinton and Donald Trump were also targeted by Russian spies, as were the computers of some Republican political action committees, U.S. officials said. But details on those cases were not available. [Russia denies DNC hack and says maybe someone ‘forgot the password’ ] “I completely rule out a possibility that the [Russian] government or the government bodies have been involved in this,” Dmitry Peskov, the Kremlin’s spokesman, told the Reuters news agency in Moscow. Trump captures the nation’s attention on the campaign trail View Photos The Republican candidate continues to dominate the presidential contest. Some of the hackers had access to the DNC network for about a year, but all were expelled over the past weekend in a major computer cleanup campaign, the committee officials and experts said. The DNC said that no financial, donor or personal information appears to have been accessed or taken, suggesting that the breach was traditional espionage, not the work of criminal hackers. The intrusions are an example of Russia’s interest in the U.S. political system and its desire to understand the policies, strengths and weaknesses of a potential future president — much as American spies gather similar information on foreign candidates and leaders. The depth of the penetration reflects the skill and determination of the United States’ top cyber-adversary as Russia goes after strategic targets, from the White House and State Department to political campaign organizations. [Russian hackers breach some White House computers] “It’s the job of every foreign intelligence service to collect intelligence against their adversaries,” said Shawn Henry, president of CrowdStrike, the cyber firm called in to handle the DNC breach and a former head of the FBI’s cyber division. He noted that it is extremely difficult for a civilian organization to protect itself from a skilled and determined state such as Russia. Trump calls Putin 'strong,' but insists 'strong doesn't mean good' Play Video 1:42 Donald Trump has repeatedly called Vladimir Putin a "strong" leader, but toes a fine line on praising the Russian president. (Peter Stevenson/The Washington Post) “We’re perceived as an adversary of Russia,” he said. “Their job when they wake up every day is to gather intelligence against the policies, practices and strategies of the U.S. government. There are a variety of ways. [Hacking] is one of the more valuable because it gives you a treasure trove of information.” Russian President Vladimir Putin has spoken favorably about Trump, who has called for better relations with Russia and expressed skepticism about NATO. But unlike Clinton, whom the Russians probably have long had in their spy sights, Trump has not been a politician for very long, so foreign agencies are playing catch-up, analysts say. “The purpose of such intelligence gathering is to understand the target’s proclivities,” said Robert Deitz, former senior councillor to the CIA director and a former general counsel at the National Security Agency. “Trump’s foreign investments, for example, would be relevant to understanding how he would deal with countries where he has those investments” should he be elected, Deitz said. “They may provide tips for understanding his style of negotiating. In short, this sort of intelligence could be used by Russia, for example, to indicate where it can get away with foreign adventurism.” [The not-completely-crazy theory that Russia leaked the Panama Papers] Other analysts noted that any dirt dug up in opposition research is likely to be made public anyway. Nonetheless, DNC leadership acted quickly after the intrusion’s discovery to contain the damage. “The security of our system is critical to our operation and to the confidence of the campaigns and state parties we work with,” said Rep. Debbie Wasserman Schultz (Fla.), the DNC chairwoman. “When we discovered the intrusion, we treated this like the serious incident it is and reached out to CrowdStrike immediately. Our team moved as quickly as possible to kick out the intruders and secure our network.” [Debbie Wasserman Schultz’s Worst Week in Washington] Clinton called the intrusion “troubling” in an interview with Telemundo. She also said, “So far as we know, my campaign has not been hacked into,” and added that cybersecurity is an issue that she “will be absolutely focused on” if she becomes president. “Because whether it’s Russia, or China, Iran or North Korea, more and more countries are using hacking to steal our information, to use it to their advantage,” she said. A spokeswoman for the Trump campaign referred questions to the Secret Service. DNC leaders were tipped to the hack in late April. Chief executive Amy Dacey got a call from her operations chief saying that their information technology team had noticed some unusual network activity. “It’s never a call any executive wants to get, but the IT team knew something was awry,” Dacey said. And they knew it was serious enough that they wanted experts to investigate. That evening, she spoke with Michael Sussmann, a DNC lawyer who is a partner with Perkins Coie in Washington. Soon after, Sussmann, a former federal prosecutor who handled computer crime cases, called Henry, whom he has known for many years. Within 24 hours, CrowdStrike had installed software on the DNC’s computers so that it could analyze data that could indicate who had gained access, when and how. The firm identified two separate hacker groups, both working for the Russian government, that had infiltrated the network, said Dmitri Alperovitch, CrowdStrike co- founder and chief technology officer. The firm had analyzed other breaches by both groups over the past two years. [U.S. suspects Russia in hack of Pentagon computer network] One group, which CrowdStrike had dubbed Cozy Bear, had gained access last summer and was monitoring the DNC’s email and chat communications, Alperovitch said. The other, which the firm had named Fancy Bear, broke into the network in late April and targeted the opposition research files. It was this breach that set off the alarm. The hackers stole two files, Henry said. And they had access to the computers of the entire research staff — an average of about several dozen on any given day. The computers contained research going back years on Trump. “It’s a huge job” to dig into the dealings of somebody who has never run for office before, Dacey said. CrowdStrike is not sure how the hackers got in. The firm suspects they may have targeted DNC employees with “spearphishing” emails. These are communications that appear legitimate — often made to look like they came from a colleague or someone trusted — but that contain links or attachments that when clicked on deploy malicious software that enables a hacker to gain access to a computer. “But we don’t have hard evidence,” Alperovitch said. The two groups did not appear to be working together, Alperovitch said. Fancy Bear is believed to work for the GRU, or Russia’s military intelligence service, he said. CrowdStrike is less sure of whom Cozy Bear works for but thinks it might be the Federal Security Service, or FSB, the country’s powerful security agency, which was once headed by Putin. [How Russian special forces are shaping the fight in Syria] The lack of coordination is not unusual, he said. “There’s an amazing adversarial relationship” among the Russian intelligence agencies, Alperovitch said. “We have seen them steal assets from one another, refuse to collaborate. They’re all vying for power, to sell Putin on how good they are.” The two crews have “superb operational tradecraft,” he said. They often use previously unknown software bugs — known as “zero-day” vulnerabilities — to compromise applications. In the DNC’s case, the hackers constantly switched tactics to maintain a stealthy presence inside the network and used built-in Windows tools so that they didn’t have to resort to malicious code that might trigger alerts. “They flew under the radar,” Alperovitch said. The two groups have hacked government agencies, tech companies, defense contractors, energy and manufacturing firms, and universities in the United States, Canada and Europe as well as in Asia, he said. Cozy Bear, for instance, compromised the unclassified email systems of the White House, State Department and Joint Chiefs of Staff in 2014, Alperovitch said. “This is a sophisticated foreign intelligence service with a lot of time, a lot of resources, and is interested in targeting the U.S. political system,” Henry said. He said the DNC was not engaged in a fair fight. “You’ve got ordinary citizens who are doing hand-to- hand combat with trained military officers,” he said. “And that’s an untenable situation.” Russia has always been a formidable foe in cyberspace, but in the past two years, “there’s been a thousand-fold increase in its espionage campaign against the West,” said Alperovitch, who is also a senior fellow at the Atlantic Council.
Recommended publications
  • April 16, 2021 1 Address: Phone: (614)
    BRUCE A. WEINBERG Address: Phone: (614) 292-5642 Department of Economics Fax: (614) 292-3906 Ohio State University E-Mail: [email protected] 410 Arps Hall Web: www.bruceweinberg.net 1945 North High Street Columbus, Ohio 43210 Education: University of Chicago, Ph.D., Economics, 1996. University of Chicago, B. A., with Honors, Economics, 1991. Professional Positions: Ohio State University, Department of Economics. - Joan N. Huber Faculty Fellow in recognition of outstanding scholarship. 2015. - Professor, October 2010-. - Associate Professor, October 2001-September 2010. - Assistant Professor, October 1996-September 2001. - Director of Undergraduate Studies, 2007-2012. - John Glenn School of Public Affairs 2007-. - Faculty Associate, Battelle Center; Center for Higher Education Excellence; Center for Human Resource Research; Criminal Justice Research Center; Center for Urban and Regional Analysis (and Oversight Committee Member); Initiative in Population Research; Mershon Center. National Bureau of Economic Research - Research Associate, 2010- - Faculty Research Fellow, 2005-2010. - Visiting Scholar 2004-2005. Visiting Scholar. Princeton University, Industrial Relations Section and Department of Economics, 2012-13. Visiting Scholar, Federal Reserve Bank of Cleveland, 2009-2010. Taubman Center, Harvard University, Visiting Scholar, 2004-2005. Institute for the Study of Labor (IZA), Bonn, Research Fellow, 2002-. Hoover Institution, National Fellow, 2000-2001. Extended Visits: Hebrew University; IZA; LSE; Maastricht University. Teaching Experience: Undergraduate Microeconomics (Honors Principles, Intermediate, Calculus-Based Intermediate, and MBA), Ohio State University. Undergraduate and Graduate Labor Economics, Ohio State University. Undergraduate Research. Ohio State University. April 16, 2021 1 Fellowships and Grants National Institutes of Health. National Institute of General Medical Sciences. PI. “Invisible Collaborators: Underrepresentation, Research Networks, and Outcomes of Biomedical Researchers.” $869,402.
    [Show full text]
  • Special 75Th Anniversary Issue
    NIEMAN REPORTS SUMMER/FALL 2013 VOL. 67 NO. 2-3 Nieman Reports The Nieman Foundation for Journalism Harvard University One Francis Avenue Cambridge, Massachusetts 02138 VOL. 67 NO. 2-3 SUMMER-FALL 2013 TO PROMOTE AND ELEVATE THE STANDARDS OF JOURNALISM 75 TH ANNIVERSARY ISSUE THE NIEMAN FOUNDATION AT HARVARD UNIVERSITY Special 75th Anniversary Issue Agnes Wahl Nieman The Faces of Agnes Wahl Nieman About the cover: British artist Jamie Poole (left) based his portrait of Agnes Wahl Nieman on one of only two known images of her—a small engraving from a collage published in The Milwaukee Journal in 1916—and on the physical description she provided in her 1891 passport application: light brown hair, bluish-gray eyes, and fair complexion. Using portraits of Mrs. Nieman’s mother and father as references, he worked with cut pages from Nieman Reports and from the Foundation’s archival material to create this likeness. About the portrait on page 6: Alexandra Garcia (left), NF ’13, an Emmy Award-winning multimedia journalist with The Washington Post, based her acrylic portrait with collage on the photograph of Agnes Wahl Nieman standing with her husband, Lucius Nieman, in the pressroom of The Milwaukee Journal. The photograph was likely taken in the mid-1920s when Mrs. Nieman would have been in her late 50s or 60s. Garcia took inspiration from her Fellowship and from the Foundation’s archives to present a younger depiction of Mrs. Nieman. Video and images of the portraits’ creation can be seen at http://nieman.harvard.edu/agnes. A Nieman lasts a year ~ a Nieman lasts a lifetime SUMMER/FALL 2013 VOL.
    [Show full text]
  • 08/15/12 Robert II V CIA and DOJ Status Affidavit
    UNITED STATES DISTRICT COURT EASTERN DISTRICT OF NEW YORK --------------------------------------------------------------X CHARLES ROBERT II, a/k/a Snowflake 5391 PLAINTIFF’S STATUS AFFIDAVIT RE THE OGIS QUIET SETTLMENT REQUEST Cv –02-6788 (Seybert, J) Plaintiff, -against- THE CENTRAL INTELLIGENCE AGENCY and THE DEPARTMENT OF JUSTICE Defendant. -------------------------------------------------------------X State of New York ) ) County of Nassau ) Charles Robert being duly sworn swears under penalty of law the following: 1. He makes this Affidavit to comply with the Court’s February 15, 2012 Order. “Plaintiff is ORDERED to file a status report with the Court by August 15, 2012.” 2. This August 15, 2012 Status Affidavit is a supplement to the facts set forth in the plaintiff’s December 14, 2011 Corrected Affidavit and February 3, 2012 letter to the Court. A. The failure of the December 14, 2011 quiet settlement plan and the modified plan based on the Ninth Circuit’s August 7, 2012 Al-Haramain holding re § 1806 of the FISA 3. The plaintiff reports that the proposed prosecution plan as explained in the December 14, 2011 Robert II v CIA and DOJ Corrected Affidavit § WW, has failed. However, on August 7, 2012 the Ninth Circuit decided Al-Haramain Islamic Foundation v. Obama, __F.3d __(9th Cir. 2012). That decision held that Congress waived the sovereign immunity defense when it enacted Section 1806 the Foreign Intelligence Surveillance Act (FISA), 50 U.S.C. § 1806. Thus, the plaintiff will renew his prosecution efforts to secure NARA OGIS facilitation services to secure in 2012 a quiet settlement of this FOIA action without further burdening the 1 court.
    [Show full text]
  • Les Républicains, De Dwight D. Eisenhower À George W
    « LES RÉPUBLICAINS, DE DWIGHT D. EISENHOWER À GEORGE W. BUSH (1952-2008) » BIBLIOGRAPHIE Cette bibliographie sélective se compose de rubriques thématiques et biographiques constituées principalement d’ouvrages universitaires. Elle comporte aussi deux rubriques présentant, de manière non exhaustive, des « éléments du canon conservateur » d’une part, des « mémoires et témoignages » d’autre part. Elle signale enfin, à l’attention des étudiants et des préparateurs, un ensemble de « textes polémiques » destinés au grand public américain. Ces documents, souvent très partisans, témoignent de la vivacité du débat politique ; c’est la raison pour laquelle ils ont été retenus. Dans les rubriques 1 à 13, les ouvrages précédés de deux étoiles (**) sont considérés comme fondamentaux. Ceux qui sont précédés d’une étoile (*) sont importants. Les autres apportent d’utiles compléments d’information. 1- Ouvrages généraux sur la période Blum, John Morton. Years of Discord: American Politics and Society, 1961-1974. New York: W.W. Norton & Co., 1992. Matusow, Allen J. The Unraveling of America. 1984. Athens: University of Georgia Press, 2009. Melandri, Pierre. Histoire des États-Unis. II- Le déclin ? Depuis 1974. Paris: Perrin, 2013. *Patterson, James T. Grand Expectations: Postwar America, 1945-1974. New York: Oxford University Press, 1996. *Patterson, James T. Restless Giant: The United States from Watergate to Bush v. Gore. New York: Oxford University Press, 2005. Portes, Jacques. Histoire des États-Unis. De 1776 à nos jours. Paris: Armand Colin, 2010. *Schulman, Bruce J. The Seventies: The Great Shift in American Culture, Society, and Politics. New York: The Free Press, 2001. 1 2- Le Parti républicain Blumenthal, Sidney. The Strange Death of Republican America: Chronicles of a Collapsing Party.
    [Show full text]
  • Download This Issue
    NEW FOCUS AT SUPERBUGS: THE BATTLE OVER CAREER SERVICES FIGHTING BACK HIGHER ED PRINCETON ALUMNI WEEKLY A POSE FOR POWER Amy Cuddy *05 says that our body language shapes not just how others see us, but how we see ourselves APRIL 2, 2014 PAW.PRINCETON.EDU 00paw0402_Cov.indd 1 3/20/14 1:52 PM ANNUAL GIVING Making a difference “The education, mentorship, socialization, and wide latitude I received to find my own way as a graduate student provided me with everything I needed for a successful career in academia, which took me to professorships at two universities before returning to Princeton, where I first studied as a graduate student.” — DOUG MASSEY *78 Henry G. Bryant Professor of Sociology and Public Affairs, and Director of the Office of Population Research Photo: Prestige Portraits by Lifetouch This year’s Annual Giving campaign ends on June 30, 2014. To contribute by credit card, please call our 24-hour gift line at 800-258-5421 (outside the U.S., 609-258-3373), or use our secure website at www.princeton.edu/ag. Checks made payable to Princeton University can be mailed to Annual Giving, Box 5357, Princeton, NJ 08543-5357. April 2, 2014 Volume 114, Number 10 An editorially independent magazine by alumni for alumni since 1900 PRESIDENT’S PAGE 2 INBOX 3 FROM THE EDITOR 5 ON THE CAMPUS 11 New direction in career advising Where new grads found jobs Outgoing Dean William Russel on graduate education Fathers of the Internet STUDENT DISPATCH: Family life SPORTS: One mile, under four minutes Women’s basketball Sports shorts LIFE OF THE MIND 19 Battling the superbugs Faculty books PRINCETONIANS 33 W.
    [Show full text]
  • For Immediate Release Contact: Betsy Holahan [email protected]
    For Immediate Release Contact: Betsy Holahan [email protected] MEDIA ADVISORY National Academy of Public Administration and George Mason University’s Schar School of Policy and Government Hold Forum on Prioritizing Governance for Resilient Critical Infrastructure “Governing Across the Divide” Event Features Keynote Address by Ambassador Richard D. Kauzlarich WASHINGTON, DC – The National Academy of Public Administration and George Mason University’s Schar School of Policy and Government will hold a one-day interactive forum in Arlington, Virginia on October 30th to examine the governance issues surrounding the four critical infrastructure lifelines of transportation, energy, water delivery and communications. “Critical infrastructure systems such as reliable energy and clean water are essential to our nation’s ability to function and they are some of the most important responsibilities of government,” said Terry Gerton, President and CEO of the National Academy of Public Administration. “Any disruption of these networks can have terrible consequences, so we look forward to hearing from experts in all of these fields about how government leaders ensure the capacity to safeguard our critical infrastructure in the years to come.” During the final of four regional Governing Across the Divide forums initiated by the Academy, government officials, academics and thought leaders from across the public, private, and nonprofit sectors will gather to discuss governance and critical infrastructure challenges facing leaders at the federal, state and local levels. Previous Governing Across the Divide events took place in Sacramento, CA, Austin, TX, and Syracuse, NY. "The Schar School is delighted to partner with the National Academy of Public Administration to hold this important policy forum at our Arlington, Virginia campus,” said Dr.
    [Show full text]
  • Betsy Holahan [email protected]
    For Immediate Release October 30, 2017 Contact: Betsy Holahan [email protected] National Academy of Public Administration and George Mason University’s Schar School of Policy and Government Hold Forum on Prioritizing Governance for Resilient Critical Infrastructure Ambassador Richard D. Kauzlarich Delivers Keynote Address at Final “Governing Across the Divide” Event WASHINGTON, DC – The National Academy of Public Administration and George Mason University’s Schar School of Policy and Government today hosted a one-day interactive forum on the governance issues surrounding the four critical infrastructure lifelines of transportation, energy, water delivery and communications. “We heard from a wide array of experts on how government leaders at all levels can work to safeguard our critical infrastructure, which is essential to the safety and well-being of all citizens,” said Terry Gerton, President and CEO of the National Academy of Public Administration. “Today’s forum helped us identify specific areas of governance that we can improve to ensure the resilience of essential infrastructure networks and systems.” Today’s event was the final installment in a series of four regional Governing Across the Divide forums initiated by the Academy, which brought together government officials, academics and thought leaders from across the public, private, and nonprofit sectors. Previous Governing Across the Divide events took place in Sacramento, CA, Austin, TX, and Syracuse, NY. Academy leaders will highlight and discuss Governing Across The Divide findings at the upcoming Academy Fall Meeting, to be held November 16-17 in Washington, D.C. "Resiliency isn't just about social vulnerability -- physical systems are also at risk now more than ever,” said Dr.
    [Show full text]
  • Why Won't the President Rein in the Intelligence Community?
    THE POLITICAL SCENE STATE OF DECEPTION Why won’t the President rein in the intelligence community? BY RYAN LIZZA DECEMBER 16, 2013 n March 12, 2013, James R. Clapper appeared before the Senate Select Committee on OIntelligence to discuss the threats facing America. Clapper, who is seventy-two, is a retired Air Force general and Barack Obama’s director of National Intelligence, in charge of overseeing the National Security Agency, the Central Intelligence Agency, and fourteen other U.S. spy agencies. Clapper is bald, with a gray goatee and rimless spectacles, and his affect is intimidatingly bureaucratic. The fifteen-member Intelligence Committee was created in the nineteen-seventies, after a series of investigations revealed that the N.S.A. and the C.I.A. had, for years, been illegally spying on Americans. The panel’s mission is to conduct “vigilant legislative oversight” of the intelligence community, but more often it treats senior intelligence officials like matinée idols. As the senators took turns at the microphone, greeting Clapper with anodyne statements and inquiries, he obligingly led them on a tour of the dangers posed by homegrown extremists, far-flung terrorist groups, and emerging nuclear powers. “This hearing is really a unique opportunity to inform the American public to the extent we can about the threats we face as a nation, and worldwide,” Dianne Feinstein, a California Democrat and the committee’s chairman, said at one point. She asked committee members to “refrain from asking questions here that have classified answers.” Saxby Chambliss, a Georgia Republican, asked about the lessons of the terrorist attack in Benghazi.
    [Show full text]
  • Clinton Watts Testimony Msnbc
    Clinton Watts Testimony Msnbc Execrative Harland wash-up left or understudied aeronautically when Shepperd is changed. Transudatory and didynamous Thurston entrancing so bushily that Brice ball his mannequin. Hercule afford shipshape while Samoyedic Lane emphasize protectively or mainlining prayingly. Circuit court upheld by Scott was found to counter this premium access or macedonia held in this will come under house in history of clinton watts testimony msnbc as false or latino lawmakers about who advocate for. Presidential candidate hillary clinton stepped back at least one count of clinton watts testimony msnbc and russian propaganda exacerbated criticism of false registration for a convicted by msnbc. Nakisha jordan pleaded guilty over in testimony that people fired by clinton watts testimony msnbc. She might ease some of clinton, while posing in maplewood, a municipal debt, amy adele busefink and clinton watts testimony msnbc and let obamacare. Clint Watts Wikipedia. Hilary duff shows no freedom caucus, watts told trump seeks to influence by clinton watts testimony msnbc contributor for testimony against clinton. He is now moving against clinton watts testimony msnbc contributor jeremy bash discussing his executive powers, who campaigned on. Kim kardashian steps out of msnbc contributor jeremy bash discussing impeachment inquiry into europe as diabetes and clinton watts testimony msnbc and kanye west wing and furnished many states. Watts told reporters after considerable testimony both the entire GOP field trip been targeted by the Russians. The clinton into it was due to a graphic is spreading during an absentee votes and clinton watts testimony msnbc for president on campuses across the senate intelligence committee chairman informed.
    [Show full text]
  • Legislative Proposals to Update the Foreign Intelligence Surveillance Act (Fisa)
    LEGISLATIVE PROPOSALS TO UPDATE THE FOREIGN INTELLIGENCE SURVEILLANCE ACT (FISA) HEARING BEFORE THE SUBCOMMITTEE ON CRIME, TERRORISM, AND HOMELAND SECURITY OF THE COMMITTEE ON THE JUDICIARY HOUSE OF REPRESENTATIVES ONE HUNDRED NINTH CONGRESS SECOND SESSION SEPTEMBER 6, 2006 Serial No. 109–136 Printed for the use of the Committee on the Judiciary ( Available via the World Wide Web: http://judiciary.house.gov U.S. GOVERNMENT PRINTING OFFICE 29–746 PDF WASHINGTON : 2006 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2250 Mail: Stop SSOP, Washington, DC 20402–0001 VerDate 0ct 09 2002 11:47 Oct 17, 2006 Jkt 000000 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 G:\WORK\CRIME\090606\29746.000 HJUD2 PsN: 29746 COMMITTEE ON THE JUDICIARY F. JAMES SENSENBRENNER, JR., Wisconsin, Chairman HENRY J. HYDE, Illinois JOHN CONYERS, JR., Michigan HOWARD COBLE, North Carolina HOWARD L. BERMAN, California LAMAR SMITH, Texas RICK BOUCHER, Virginia ELTON GALLEGLY, California JERROLD NADLER, New York BOB GOODLATTE, Virginia ROBERT C. SCOTT, Virginia STEVE CHABOT, Ohio MELVIN L. WATT, North Carolina DANIEL E. LUNGREN, California ZOE LOFGREN, California WILLIAM L. JENKINS, Tennessee SHEILA JACKSON LEE, Texas CHRIS CANNON, Utah MAXINE WATERS, California SPENCER BACHUS, Alabama MARTIN T. MEEHAN, Massachusetts BOB INGLIS, South Carolina WILLIAM D. DELAHUNT, Massachusetts JOHN N. HOSTETTLER, Indiana ROBERT WEXLER, Florida MARK GREEN, Wisconsin ANTHONY D. WEINER, New York RIC KELLER, Florida ADAM B. SCHIFF, California DARRELL ISSA, California LINDA T. SA´ NCHEZ, California JEFF FLAKE, Arizona CHRIS VAN HOLLEN, Maryland MIKE PENCE, Indiana DEBBIE WASSERMAN SCHULTZ, Florida J.
    [Show full text]
  • The Shadow Factory Also by James Bamford
    This book has been optimized for viewing at a monitor setting of 1024 x 768 pixels. THE SHADOW FACTORY ALSO BY JAMES BAMFORD A Pretext for War Body of Secrets The Puzzle Palace ■ ■ THE SHADOW FACTORY ■ The Ultra-Secret NSA from9/11 to the Eavesdropping on America JAMES BAMFORD DOUBLEDAY New York London Toronto Sydney Auckland ■ ■ Copyright © 2008 by James Bamford All Rights Reserved Published in the United States by Doubleday, an imprint of The Doubleday Publishing Group, a division of Random House, Inc., New York. www.doubleday.com DOUBLEDAY is a registered trademark and the DD colophon is a trademark of Random House, Inc. Book design by Michael Collica Library of Congress Cataloging-in-Publication Data Bamford, James. The shadow factory : the ultra-secret NSA from 9/11 to the eavesdropping on America / James Bamford. p. cm. Includes bibliographical references and index. 1. United States. National Security Agency—History. 2. Intelligence service—United States. 3. Electronic surveillance—United States. 4. United States—Politics and government—2001– I. Title. UB256.U6B38 2008 327.1273—dc22 2008026448 eISBN: 978-0-385-52839 -9 v1.0 To Mary Ann And to my father, Vincent In memory of my mother, Katherine And to Tom, Paula, and Christina I’m very grateful for their constant support and encouragement. Contents Acknowledgments .......................... xi Introduction ................................. 1 BOOK ONE: ATTACK Sanaa ...................................... 7 Intercept ................................... 12 San Diego ................................
    [Show full text]
  • The Beating of Rodney King
    Brian Martin, Justice Ignited, chapter 5 (author’s prepublication version) 5 The beating of Rodney King Shortly after midnight on 3 March 1991, context of racism and social control,1 an Rodney King was beaten by officers of the examination of the practices of professionals, Los Angeles Police Department. King was hit namely the police,2 an analysis of media by two tasers — electroshock weapons using narratives about the beating,3 and a study of two darts connected by wires to a high-voltage the effects of the beating on public opinion source — and then struck dozens of times by about racial discrimination.4 metal batons, as well as being kicked, over a If the beating is thought of as an attack on period of several minutes. Four officers King, then it is reasonable to say the attack participated in the arrest and more than 20 backfired: it recoiled adversely on the attack- police were present during the beating, which ers. That the beating ended up being damaging was illuminated by floodlights from a police to the police has been attested by observers of helicopter hovering overhead. diverse persuasions5 and confirmed by re- This event probably would have become search.6 just another arrest statistic except that a portion of the incident was captured on 1. Robert Gooding-Williams, ed., Reading videotape by an observer, George Holliday, Rodney King/Reading Urban Uprising (New who heard the commotion from his apartment York: Routledge, 1993). nearby. After the video was screened on television, the “Rodney King beating” became 2. Charles Goodwin, “Professional Vision,” the most well known case of police use of American Anthropologist 96 (1994): 606–33.
    [Show full text]